Openly accessible

Zero permission android applications - attacks and defenses

Moonsamy, Veelasha and Batten, Lynn 2012, Zero permission android applications - attacks and defenses, in ATIS 2012 : Proceedings of the 3rd Applications and Technologies in Information Security Workshop, School of Information Systems, Deakin University, Melbourne, Vic., pp. 5-9.

Attached Files
Name Description MIMEType Size Downloads
moonsamy-zeropermission-2012.pdf Published version application/pdf 228.81KB 44

Title Zero permission android applications - attacks and defenses
Author(s) Moonsamy, Veelasha
Batten, Lynn
Conference name Applications and Technologies in Information Security. Workshop (3rd : 2012 : Melbourne, Vic.)
Conference location Melbourne, Vic.
Conference dates 7 Nov. 2012
Title of proceedings ATIS 2012 : Proceedings of the 3rd Applications and Technologies in Information Security Workshop
Editor(s) Warren, Matthew
Publication date 2012
Conference series Applications and Technologies in Information Security Workshop
Start page 5
End page 9
Total pages 5
Publisher School of Information Systems, Deakin University
Place of publication Melbourne, Vic.
Keyword(s) android
application
permission
Summary Google advertises the Android permission framework as one of the core security features present on its innovative and flexible mobile platform. The permissions are a means to control access to restricted AP/s and system resources. However, there are Android applications which do not request permissions at all.In this paper, we analyze the repercussions of installing an Android application that does not include any permission and the types of sensitive information that can be accessed by such an application. We found that even app/icaaons with no permissions are able to access sensitive information (such the device ID) and transmit it to third-parties.
ISBN 9780987229823
Language eng
Field of Research 080502 Mobile Technologies
Socio Economic Objective 890103 Mobile Data Networks and Services
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2012, Deakin University, School of Information Systems
Persistent URL http://hdl.handle.net/10536/DRO/DU:30051356

Document type: Conference Paper
Collections: School of Information Technology
Open Access Collection
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Access Statistics: 115 Abstract Views, 44 File Downloads  -  Detailed Statistics
Created: Mon, 18 Mar 2013, 09:41:33 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.